TW486902B - Method capable of preventing electronic documents from being illegally copied and its system - Google Patents
Method capable of preventing electronic documents from being illegally copied and its system Download PDFInfo
- Publication number
- TW486902B TW486902B TW089116219A TW89116219A TW486902B TW 486902 B TW486902 B TW 486902B TW 089116219 A TW089116219 A TW 089116219A TW 89116219 A TW89116219 A TW 89116219A TW 486902 B TW486902 B TW 486902B
- Authority
- TW
- Taiwan
- Prior art keywords
- terminal
- encryption key
- identification code
- user
- server host
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000012545 processing Methods 0.000 claims description 13
- 230000008569 process Effects 0.000 claims description 11
- 230000009471 action Effects 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 6
- 238000012795 verification Methods 0.000 description 6
- 238000012546 transfer Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 238000012790 confirmation Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- XEEYBQQBJWHFJM-UHFFFAOYSA-N Iron Chemical compound [Fe] XEEYBQQBJWHFJM-UHFFFAOYSA-N 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000007613 environmental effect Effects 0.000 description 2
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 2
- 239000010931 gold Substances 0.000 description 2
- 229910052737 gold Inorganic materials 0.000 description 2
- 206010019233 Headaches Diseases 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 231100000869 headache Toxicity 0.000 description 1
- 229910052742 iron Inorganic materials 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
486902 五、發明說明(1) 本發明係提供一種使用於電腦系統中可防止電子 盜拷的方法,尤指一種可防止利用網際網路下載電子 至一電子閱讀裝置,卻又非法拷貝至其他電子閱讀裝 方法。 傳統上知識是靠印刷於紙張上的書籍或雜誌來加 播,廣播及電視興起後加快了知識傳播的速度,如今 通訊及網際網路的蓬勃發展,更以驚人的速度將知識 訊傳播到世界上各個角落。由於網際網路技術的發展 造出許多新的商業模式,這些新的商業模式有一個共 特點,就是利用網際網路來做生意,也就是近來通稱 子商務。舉例而言,傳統上如果要購買書籍必須親自 人到書店尋找後加以購買,由於網際網路的興起’如 AMAZON等網路書店可以讓使用者在線上搜尋到想要的 並可直接下單購買。雖然,這使得購買書籍的方式大 化,然而,這還是有一個不方便之處,就是有關書籍 存,一但書籍購買的愈多愈需要足夠的空間來加以放 同時管理上也更加繁雜。 有鑑於此,「電子閱讀裝置」的概念遂被提出以 此種需要,也就是說將原來書籍中的文字或圖片數位 形成電子書籍,消費者只要有一台終端機可以連接上 再加上某些特定的程式軟體,就可以很方便地於線上 想要的電子書籍或文件,並將此電子書籍下傳到消費 文件 文件 置的 以傳 電腦 與資 ,創 同的 的電 或請 書I皆 為簡 的保 置, 因應 化, 網, 購買 者所486902 V. Description of the invention (1) The present invention provides a method for preventing electronic piracy in a computer system, especially a method for preventing the use of the Internet to download electrons to an electronic reading device, but illegally copying to other electronic devices. Read how to install. Traditionally, knowledge was broadcasted by books or magazines printed on paper. The rise of radio and television accelerated the spread of knowledge. Today, the rapid development of communications and the Internet has spread knowledge to the world at an alarming rate. On every corner. Due to the development of Internet technology, many new business models have been created. These new business models have a common feature in that they use the Internet to do business, which is known as sub-commerce recently. For example, traditionally, if you want to buy a book, you have to go to the bookstore to find it and buy it. Due to the rise of the Internet, online bookstores such as AMAZON allow users to find what they want online and place an order. . Although this makes the way of purchasing books larger, there is still an inconvenience that is related to the storage of books. Once more books are purchased, more and more space is needed to store them, and management is more complicated. In view of this, the concept of "e-reading device" has been proposed to meet this need, that is, to digitally form the text or pictures in the original book into an e-book. Consumers only need a terminal to connect to it and add some With specific program software, you can easily download the e-books or documents you want online, and download the e-books to the consumer document files for the transfer of computers and information. Retention, response, net, buyer
486902 五、發明說明(2) 在的終端機即可進行閱讀,可以符合這種需求的終端機也 就是所謂的「電子閱讀裝置」。曾經也有許多出版集團有 鑒於此一廣大的消費市場而欲投入於電子書店及電子書籍 的經營,然而,卻因為某些配套的機制尚未建立而臨時中 途喊停。原因之一,是消費者閱讀習慣所隱含市場不成熟 的憂慮。也就是說,大部分消費者還是習慣從紙本的形式 來閱讀書籍,想要推動以「電子閱讀裝置」來閱讀電子書 籍必須要推翻消費者根深蒂固的閱讀習慣,同時也必須經 過冗長的教育與適應的過程。然而另一個更重要的因素 是,低廉的再複製成本與簡便的傳播散佈能力,這使得電 子書籍的市場面臨無法推展的嚴重威脅。 這個嚴重威脅來自於從事電子書籍販買的經銷商遭遇 一個很頭痛而難以解決的問題:電子書籍可以很容易多次 拷貝分送給非交易雙方的第三人。電子書籍之所以便利是 由於其屬於無形的電子檔案,相較於有實際形體的傳統書 籍而言自然傳送方便且可以節省大量放置的空間,然而, 也就因為其屬於無形的電子檔案傳送方便,使得消費者於 合法購買閱讀後,卻可以非法的任意加以拷貝傳送並散佈 給其他人。也就是說,如果無法設計出一套完善的電子書 籍交易機制,以有效防止「合法購買卻非法散佈」的情 事,從事電子書籍經銷商每賣出一本電子書籍給某一消費 者,就等於將此電子書籍贈送給了所有其他的消費者,在 這種情形下,經銷商無法維持合理的利潤,這種型式的電486902 V. Description of the invention (2) The terminal can be read at the terminal. The terminal that can meet this demand is also called "electronic reading device". In the past, many publishing groups wanted to invest in the operation of e-bookstores and e-books in view of this large consumer market. However, because some supporting mechanisms had not yet been established, they temporarily stopped. One reason is the immaturity of the market implied by consumers' reading habits. In other words, most consumers are still accustomed to reading books in paper form. To promote the use of "e-reading devices" to read e-books, consumers must overthrow the deep-rooted reading habits of consumers, and must also undergo lengthy education and The process of adaptation. However, another more important factor is the low cost of re-copying and the ability to easily disseminate and disseminate, which makes the market for electronic books face a serious threat that cannot be developed. This serious threat comes from a headache that is hard to solve for dealers engaged in the sale of e-books: E-books can be easily copied and distributed to third parties who are not parties to the transaction. E-books are convenient because they are intangible electronic files. Compared with traditional books with physical forms, they are naturally easier to transfer and can save a lot of space. However, because they are easy to transfer, It allows consumers to purchase and read legally, but can illegally copy and transmit it to other people. In other words, if a complete e-book trading mechanism cannot be designed to effectively prevent the situation of "legitimate purchase but illegal distribution", every time an e-book dealer sells an e-book to a certain consumer, it is equivalent to This e-book was given to all other consumers. In this case, the distributor could not maintain a reasonable profit.
486902 五、發明說明(3) 子商務自然無法生存,這也就是電子書籍至今推展及普及 的速度不如預期的重要原因。然而,電子書籍具有無紙化 符合環保概念、效率化傳播速度快速、經濟化不佔大量空 間等多重優點,可節省許多珍貴的資源,如果只是因為未 能解決上述「合法購買卻非法散佈」的情事而無法加以推 廣,實在是經濟利益的重大損失。 有鑑於上述問題,本發明的主要目的是在提供一種使 用於電腦系統中可防止電子文件盜拷的方法,尤指一種可 防止利用網際網路下載電子文件至一電子閱讀裝置,卻又 非法拷貝至其他電子閱讀裝置的方法,以解決上述問題。 請參閱圖一,圖一為本發明可防止電子文件盜拷之電 腦系統之示意圖。本發明防盜拷電腦系統10 0包含有一伺 服器主機1 0 2可經由一防火牆裝置1 0 3以連接上網際網路 1 0 4,另有複數個使用戶者也可經由各自的終端機1 〇 6、 1 0 8、1 1 0連接上網際網路1 0 4。防火牆裝置1 0 3可用來區隔 伺服器主機1 0 2與其外部的網際網路1 0 4,其可透過網路訊 息封包的過濾以及安全策略的訂定,讓某些特定的網路服 務及安全的網路訊息,例如:經過註冊的遠端登錄、電子 郵件、檔案傳輸等可以進出防火牆裝置1 0 3,以確保伺服 器主機1 0 2中的設定及資訊不會遭受非法入侵及修改。每 一終端機106、108、110可為一個人桌上型電腦(desktop computer)、筆記型電腦(notebook computer)、個人數位486902 V. Description of invention (3) Naturally, sub-commerce cannot survive, which is an important reason why e-books have not been promoted and popularized as fast as expected. However, e-books have the multiple advantages of being paperless in line with the concept of environmental protection, fast in efficiency, and not costing a lot of space, and can save many precious resources. If only the above-mentioned "legal purchase but illegal distribution" is not resolved, The situation cannot be promoted, which is really a great loss of economic benefits. In view of the above problems, the main object of the present invention is to provide a method for preventing electronic documents from being stolen in a computer system, especially a method for preventing electronic documents from being downloaded to an electronic reading device through the Internet, but illegally copying them. To other electronic reading devices to solve the above problems. Please refer to FIG. 1. FIG. 1 is a schematic diagram of a computer system capable of preventing electronic files from being stolen. The anti-theft computer system 100 of the present invention includes a server host 102 that can be connected to the Internet 104 through a firewall device 103, and a plurality of users can also pass through their respective terminals 10. 6, 1 0 8, 1 10 Connect to the Internet 104. The firewall device 103 can be used to separate the server host 10 and the external Internet 104. It can filter the network message packets and set security policies to allow certain specific network services and Secure network messages, such as registered remote login, email, and file transfer, can enter and exit the firewall device 103 to ensure that the settings and information in the server host 102 cannot be illegally invaded or modified. Each terminal 106, 108, 110 can be a personal desktop computer, notebook computer, personal digital
486902 五、發明說明(4) 助理器(P D A )或是可連'接上網的行動電話(W A P c e 1 1 u 1 a r phone)等,只要用戶的終端機是可以連接上網並且傳輸數 位資訊的都可以適用於本發明防盜拷電腦系統1 0 0。 以本發明之較佳實施例而言,終端機1 0 6、1 0 8、1 1 0 為個人桌上型電腦,其中包含一中央處理器,一硬碟機, 一網路卡,輸入裝置如鍵盤、滑鼠、搖桿等,輸出裝置如 螢幕、印表機等。每一終端機1 0 6、1 0 8、1 1 0中並各自具 有至少一電腦辨識碼,用來代表終端機之身分認證,如中 央處理器之辨識碼、硬碟機之辨識碼或是網路卡之辨識碼 等皆可成為該終端機之電腦辨識碼,以便伺服器主機1 〇 2 於後續電子交易或資料傳輸時可以確定各終端機1 〇 6、 1 0 8、1 1 0之身份或位置。 請參閱圖二,圖二為本發明防盜拷電腦系統之伺服器 主機的功能方塊圖。伺服器主機1 0 2包含一介面模組2 1 0, 一公用程式模組2 2 0,一註冊模組2 3 0,一加密餘匙產生模 組2 4 0,一加密模組2 5 0,一交易處理及查證模組2 6 0,一 資料庫2 7 0,與一控制中心2 8 0。 伺服器主機1 0 2經由介面模組2 1 0與防火牆裝置1 0 3相 連接,並透過防火牆裝置1 0 3與網際網路1 0 4進行資料傳輸 與交換,並於必要時對不同規格的資料作適當的資料轉 換。公用程式模組2 2 0中存放有伺服器主機1 0 2對外開放的486902 V. Description of the invention (4) Assistant (PDA) or mobile phone (WAP ce 1 1 u 1 ar phone) that can be connected to the Internet, as long as the user's terminal can connect to the Internet and transmit digital information It can be applied to the anti-theft computer system 100 according to the present invention. According to a preferred embodiment of the present invention, the terminals 106, 108, and 110 are personal desktop computers, which include a central processing unit, a hard disk drive, a network card, and an input device. Such as keyboard, mouse, joystick, etc., output devices such as screen, printer, etc. Each of the terminals 106, 108, 110 has at least one computer identification code, which is used to represent the identity authentication of the terminal, such as the identification code of the central processing unit, the identification code of the hard disk drive, or The identification code of the network card can be used as the computer identification code of the terminal, so that the server host 10 can determine each terminal 1 06, 108, 1 1 0 during subsequent electronic transactions or data transmission. Identity or location. Please refer to FIG. 2. FIG. 2 is a functional block diagram of a server host of the anti-theft computer system of the present invention. The server host 1 0 2 includes an interface module 2 1 0, a utility module 2 2 0, a registration module 2 3 0, a cryptographic key generation module 2 4 0, and a cryptographic module 2 5 0 , A transaction processing and verification module 260, a database 270, and a control center 280. The server host 10 is connected to the firewall device 103 through the interface module 2 10, and transmits and exchanges data with the Internet device 104 through the firewall device 103, and when necessary, it transmits data to different specifications. Data for proper data conversion. The server module 1 2 is stored in the utility module 2 2 0.
第8頁 486902 五、發明說明(5) 各種公用程式,以供使用者免費下載至各自的終端機中, 其中例如一經過編譯的閱讀應用程式,以提供使用者一登 錄、註冊、下載、閱讀電子書籍的使用者操作介面,閱讀 應用程式中並附加有一第一加密鑰匙,其功用容後再加詳 述。註冊模組2 3 0則可接受使用者及其所指定的終端機之 註冊,以便讓使用者成為合法登錄的使用者,而其所指定 的終端機也成為合法登錄而可合法下載電子書籍的用戶終 端機。加密鑰匙產生模組2 4 0會於使用者進行註冊時產生 使用者專屬的第二加密鑰匙,也就是說不同的使用者其第 二加密鑰匙都不相同。在此需加以說明,上述之第一及第 二加密餘匙其實就是一組預定長度的數位位元,例如可以 是常用的5 6 b i t s或1 2 8 b i t s,本發明之較佳實施例之鑰 匙長度是採用128 bits或是更高的bits,以增強其安全 性。 加密模組2 5 0則是用來執行各種需要加密的動作,例 如:於文件索取程序時,加密模組2 5 0會以使用者專屬的 第二加密鑰匙對使用者購買的電子書籍加密以便後續傳送 給使用者。交易處理及查證模組2 6 0則用來處理與使用者 訂單有關的事宜,並對訂單的來源及内、容進行必要的確認 及查證工作。 資料庫2 7 0則包含至少有三個子資料庫:用戶資料庫 2 7 2、密碼資料庫2 7 4、電子文件資料庫2 7 6。用戶資料庫Page 8 486902 V. Description of the invention (5) Various utility programs for users to download to their respective terminals for free, including, for example, a compiled reading application program to provide users with login, registration, download, and reading The user operation interface of the electronic book, the reading application is attached with a first encryption key, and its function will be described in detail later. The registration module 2 30 can accept the registration of the user and the terminal designated by the user, so that the user can become a legally logged in user, and the designated terminal can also be legally registered to legally download an electronic book. User terminal. The encryption key generation module 240 generates a user-specific second encryption key when the user registers, that is, different users have different second encryption keys. It should be explained here that the first and second encryption keys mentioned above are actually a set of digital bits of a predetermined length, for example, commonly used 5 6 bits or 1 2 8 bits. The key of the preferred embodiment of the present invention The length is 128 bits or higher to enhance its security. The encryption module 250 is used to perform various actions that require encryption. For example, when the document is requested, the encryption module 250 will use the user's second encryption key to encrypt the electronic book purchased by the user so that Subsequent transmission to the user. The transaction processing and verification module 260 is used to deal with matters related to the user's order, and to make necessary confirmation and verification of the source and content of the order. Database 2 70 contains at least three sub-databases: user database 2 7 2. password database 2 7 4. electronic file database 2 7 6. User database
第9頁 五、發明說明(β) 2 7 2Φ + , 及i俘放有經過合法註冊後所有使用者相關的基本資料 用其7指定的終端機的基本資料,如··代表某一用戶之使 者識別碼。密碼資料庫2 7 4則存放使用者識別碼及其專 屬的穿一 者、j弟二加密鑰匙之間的對照表,也就是說,每一個使用 真在進行注冊時,加密錄匙產生模組2 4 0所產生相對應的 ,第二加密鑰匙就是存放在密碼資料庫274中。電子文 件責,庫2 7 6則是存放將來要提供給讀者的電子書籍的明 =舍每一本電子書籍則有一獨特的電子書碼以方便查詢與 $之用。而控制中心280則是用來控制伺服器主機丨〇2的 二:,以及處理伺服器主機1 0 2中各個模組或資料庫之控 制或資訊流向。 、 的功:::f Ξ 2 1三為本發明防盜拷電腦系統之終端機 佳= ϊ π: ΐ ί端機106為例,本發明終端機106之較 30 Λ為Λ 3ί〇承腦,其中包含一中央處理器 圯丨思肢3 2 0,一硬碟機3〇4,一 置如鍵盤3 0 8、滑鼠3 1 〇、搖桿Ή 9莖於山卡3 〇 6,輸Λ衣 3 1 4、印表機3 1 6等。為了处ώ 、 诵出裝置如螢幕 換,終端機106必須從伺服"主機1〇2進行資料交 :或網際網路104上下載經過編 ’ 之公用程式模組220 機1 0 6之記憶體3 2 0或硬碟機μ φ閱讀應用裎式3 2 2至終端 提供了使用者一登錄、註冊、中儲存。閱讀應用程式322 介面,其中並附加有第一加穷:f4、閱讀電子書籍的操作 加密檔3 2 6進行解密。即伟η 1匙3 2 4可供後續對終端機 便疋對於不同使用者而言,其所Page 9 V. Description of the invention (β) 2 7 2Φ +, and i capture the basic information of all users after the legal registration, the basic information of the terminal designated by their 7, such as ... Messenger identification code. The password database 2 7 4 stores the user ID and its unique wearer, and the comparison table between the two encryption keys, that is, each registration key generation module is used when registering Corresponding to 2 40, the second encryption key is stored in the password database 274. The electronic file is responsible, and the library 2 7 6 stores the e-books to be provided to readers in the future. Each e-book has a unique e-book code for easy inquiry and $. The control center 280 is used to control the server host 2 and the processing of the control or information flow of each module or database in the server host 102. The work of ::: f Ξ 2 1 3 is the terminal of the anti-theft computer system of the present invention = ϊ π: ΐ ί terminal 106 is taken as an example. Compared with 30 Λ of the terminal 106 of the present invention, it is Λ 3 ί. It includes a central processing unit 圯 丨 thickness 3 2 0, a hard disk drive 304, a home such as a keyboard 308, a mouse 3 1 〇, a joystick Ή 9 stem in the mountain card 3 〇, lose Λ Clothing 3 1 4 and printer 3 1 6 etc. In order to deal with devices such as screen changes, the terminal 106 must transfer data from the server "host 102: or download the compiled utility module 220 on the Internet 104 and the memory of the machine 106 3 2 0 or hard disk drive μ φ reading application mode 3 2 2 to the terminal provides users with a login, registration, and storage. Reading application 322 interface, which is added with the first plus: f4, the operation of reading electronic books. The encrypted file 3 2 6 is decrypted. That is, 1 spoon 3 2 4 can be used for subsequent terminals. For different users,
486902 五、發明說明(7) / 需要的閱讀應用程式3 2 2都是相同,因此閱讀應用程式3 2 2 是事先經過編譯完成,並可供所有需要的使用者免費任意 下載’而其中的第一加密錄匙32 4也不因使用者的不同而 有所區別。 使用者以終端機1 〇 6之閱讀應用程式為界面向遠端的 伺服器主機1 0 2進行登錄與註冊時’其程序包括1 )伺服器 主機β 1 〇 2辨識閱讀應用程式是否為合法的閱讀應用程式。 2 )伺服q器主機1 0 2運用註冊模組2 3 0產生使用者識別碼與 加密鑰匙產生模組2 4 0產生其相對應之第二加密鑰匙。3 ) 祠服為主機1 〇 2將使用者識別碼加入用戶資料庫2 7 2及第二 加密输起加入密碼資料庫2 7 4。4 )終端機1 0 6之閱讀應用 程式下戴使用者識別碼及第二加密鑰匙。每一終端機 1 0 6、1 0 8、1丨〇於註冊完成後,會產生終端機加密檔3 2 6, 終端機加密檔3 2 6中包含有使用者識別碼3 2 7、使用者之專 屬第二加密錄匙32 8與本台終端機10 6之電腦辨識碼330, 終端機1 0 6將終端機加密檔3 2 6以第一加密鑰匙3 2 4進行加 密,並以加密的形式儲存於終端機1 〇 6之記憶體3 2 0或硬碟 機3 0 4中,以避免使用者不小心更改其中的内容,也可以 減低其他人以非法的方式查看並得知其中的内容。當電子 書籍下載後並需要進i丁一解7密^時,閱讀應用程式322會對 終端機加密檔32 ^ =鑰匙3 24進行解密,以擷取出 其中的第It密鐵參與"腦辨識碼33°。486902 V. Description of the invention (7) / The required reading application 3 2 2 is the same, so the reading application 3 2 2 is compiled in advance and can be downloaded free of charge by all users who need it. An encrypted recording key 32 4 is not different for different users. When the user uses the reading application of the terminal 10 as an interface to perform registration and registration with the remote server host 10 2 'the procedure includes 1) The server host β 1 〇2 identifies whether the reading application is legitimate Read the app. 2) The server host 1 0 2 uses the registration module 2 3 0 to generate the user identification code and the encryption key generation module 2 40 to generate the corresponding second encryption key. 3) Ancestral clothing is the host 10. Add the user identification code to the user database 2 72 and the second encryption input to the password database 2 7 4. 4) The reading application of the terminal 10 6 is worn by the user Identification code and second encryption key. After the registration of each terminal 106, 108, 1 丨 〇, a terminal encrypted file 3 2 6 will be generated, and the terminal encrypted file 3 2 6 contains the user identification code 3 2 7. User The exclusive second encrypted recording key 32 8 and the computer identification code 330 of this terminal 10 6, the terminal 10 6 encrypts the terminal encrypted file 3 2 6 with the first encryption key 3 2 4 and the encrypted The form is stored in the memory 3 2 0 of the terminal 1 06 or the hard disk drive 3 0 4 to prevent the user from accidentally changing the content therein, and it can also reduce others from viewing and knowing the content illegally. . When the e-book is downloaded and needs to be unlocked, the reading application 322 decrypts the encrypted file 32 ^ = key 3 24 of the terminal to extract the It ’s dense iron participation " brain recognition Code 33 °.
第11頁 486902 五、發明說明(8) 現在針對本發明之方法作一詳細說明,配合本發明防 盜拷電腦系統1 0 0之方法包含有一註冊程序與一文件索取 程序。當一使用者想要利用本發明之電腦系統1 0 0進行電 子書籍的購買之前,首先要從伺服器主機1 0 2或網際網路 10 4上的網路書店下載閱讀應用程式3 2 2,並於閱讀應用程 式3 2 2中向伺服器主機1 0 2執行一註冊程序以成為一合法登 錄的使用者或是會員,閱讀應用程式3 2 2中除了包含一般 性的介面應用程式之外,還包含上述之第一加密鑰匙 3 2 4。在註冊的同時,不但使用者需要經過註冊,使用者 將來所欲下載電子書籍的終端機1 0 6也需要經過註冊,也 就是說在註冊的過程中,相關之使用者基本資料(包括使 用者辨識碼和其相對應的第二加密鑰匙3 2 8 )會經過註冊而 儲存在伺服器主機1 〇 2中。而使用者也必須以註冊當時所 使用的終端機1 0 6作為將來下載電子書籍的電子閱讀裝 置,否則,電腦系統1 0 0會判定所使用來下載電子書籍的 電子閱讀裝置未經過註冊,而無法正常開啟所下載的電子 書籍。 當使用者利用終端機1 0 6中的閱讀應用程式3 2 2進行註 冊時,伺服器主機1 0 2會將使用者辨識碼儲存於用戶資料 庫2 7 2中,然後指定一專屬的第二加密鑰匙3 2 8給使用者, 並且將使用者與其第二加密鑰匙3 2 8之間的一對一對照關 係儲存於密碼資料庫2 74中,如此便完成了使用者及其終 端機1 0 6的合法註冊。在完成註冊後,伺服器主機1 〇 2會以Page 11 486902 V. Description of the invention (8) The method of the present invention will now be described in detail. The method for cooperating with the anti-theft computer system 100 of the present invention includes a registration program and a file requesting program. Before a user wants to use the computer system 100 of the present invention to make an electronic book purchase, the user must first download a reading application 3 2 2 from an Internet bookstore on the server host 102 or the Internet 104. And in the reading application 3 2 2 execute a registration procedure to the server host 102 to become a legally logged in user or member. In addition to the general interface application, the reading application 3 2 2 It also contains the first encryption key 3 2 4 described above. At the same time of registration, not only does the user need to be registered, but the terminal 1 06 that the user wants to download electronic books in the future also needs to be registered. That is to say, during the registration process, relevant basic user information (including the user) The identification code and its corresponding second encryption key 3 2 8) will be registered and stored in the server host 102. The user must also use the registered terminal device 106 at that time as the electronic reading device for downloading electronic books in the future, otherwise, the computer system 100 will determine that the electronic reading device used for downloading electronic books is not registered, and The downloaded e-book cannot be opened normally. When the user uses the reading application 3 2 2 in the terminal 10 to register, the server host 10 2 stores the user identification code in the user database 2 7 2 and then assigns an exclusive second The encryption key 3 2 8 is given to the user, and the one-to-one comparison relationship between the user and his second encryption key 3 2 8 is stored in the password database 2 74, thus completing the user and his terminal 1 0 6 legal registrations. After completing the registration, the server host 102 will start with
486902 、發明說明(9) 五 第 密鑰匙將使用者辨識碼3 加密输匙328加t,並傳逆j射應咸使用者之專 _、用程式在接收到加密I & /端機1 06 ’而終端機 f % 後,合先以笛 使用者辨識碼3 2 7與第 二加密;;!:將解3密\之;加密輪起將兩者進行解 密,而後 y ^ 吏用者辨識碼與第二加密铃匙 連同代表該辨人識碼再一併…形成 機加密檔3 2 6’亚儲存於^;亥合法註冊之終端機中,經過此 /註冊程序’以後終端機1〇6就可合法下載電子書籍並對 其ja球解洽、了486902 、 Invention description (9) The fifth key will encrypt the user identification code 3, the encryption key 328 plus t, and transmit the user's special code, and receive the encryption I & / terminal 1 06 'And after the terminal f%, the first encryption with the user ID 3 2 7 and the second encryption ;; : Will decrypt 3 secrets \ one; the encryption round will decrypt the two, and then y ^ the user identification code and the second encryption bell key together with the representative identification code together to form a machine encrypted file 3 2 6 ' Asia is stored in the legally registered terminal. After this / registration procedure, the terminal 106 can legally download the electronic book and disassociate it with the ja ball.
請參閱圖四,圖四為本發明防盜拷電腦系統於註冊程 序時之流程圖。將上述註冊程序以流程圖4 0 0表示如下列 杏驟: 少驟4 〇 2 :開始; 夕驟4 〇 4 ·使用者選疋一終端機1 0 6以進行後續註冊程 序,介驟4〇 6:從網際網路104上下載閱讀應用程式3 2 2到 y /々地機1 0 6 ·’ 定的終知 ^ 丧驟4 〇 8 :由終端機1 0 6的閱讀應用程式3 2 2連接伺服 努主i 進行註冊二 介驟4丨〇 ··伺服器主機1 〇 2產生使用者辨識碼及專屬的Please refer to FIG. 4, which is a flowchart of the anti-theft computer system of the present invention during the registration process. The above-mentioned registration procedure is represented by the flow chart 400 as follows: less step 4 〇2: start; evening step 4 〇 · the user selects a terminal 106 for subsequent registration procedures, step 4〇 6: Download the reading application 3 2 2 from the Internet 104 to y / ground machine 1 0 6 · 'Finally known ^ Funeral 4 〇 8: Reading application 3 1 2 by the terminal 1 6 Connect the server and host i to perform registration 2 丨 〇 · Server host 1 〇 Generate user identification code and exclusive
广一 ^寅鑰匙328並分別儲存於用戶資料庫2 72與密碼資料 第二加b⑻ 、 庫2 驟4丨2 :祠服器主機102將產生的使用者辨識碼327Guangyi ^ key 328 and stored in the user database 2 72 and the password data respectively. Second addition b⑻, bank 2 Step 4 丨 2: The user identification code 327 generated by the temple server host 102
486902 五、發明說明(10) % 3 2 4加密後傳 及其專屬的第二加密鑰匙32 8以第一加密鑰a 送至終端機106; 第一加密鑰匙 步驟4 1 4 :終端機1 0 6之閱讀應用程式以 & q 9 s、隹许 將接收到加密的使用者辨識碼3 2 7與第二加冰^ 解密; , 〃經突後之使用 步驟4 1 6 :終端機1 0 6之閱讀應用程式將解山 者辨識碼3 2 7與第二加密鑰匙3 2 8連同代表終端機.之“ 月自辨識碼3 3 0再一併加密以形成一終端機力口密福3 Y 6六奋 步騍4 1 8 :終端機1 〇 6之閱讀應用程式將終端機加搶才當 3 2 6儲存於其硬碟中;486902 V. Description of the invention (10)% 3 2 4 The encrypted encrypted transmission and its exclusive second encryption key 32 8 are sent to the terminal 106 with the first encryption key a; the first encryption key step 4 1 4: the terminal 1 0 The reading application of 6 uses & q 9 s, and promises to decrypt the encrypted user identification code 3 2 7 and the second plus ice ^; decryption, use the step 4 1 6: terminal 1 0 The reading application of 6 will encrypt the mountain solver identification code 3 2 7 and the second encryption key 3 2 8 together with the representative terminal. The "monthly self-identification code 3 3 0" will be encrypted together to form a terminal power mouth secret 3 Y 6 Six Struggles 4 1 8: The reading application of the terminal 1 06 will grab the terminal and store it as 3 2 6 in its hard disk;
步·驟4 2 〇 ··結束。Step 4 2 0 ·· End.
當使用耆及其終端機1 0 6於伺服器主機1 0 2端完成註冊 後,就可以依其個人意願於任何時候上網付費購買特定的 電子書籍,旅且將其下載至終端機1 〇 6,這/部份也就是 本發明方法所稱之文件索取程序。使用者玎從經過註冊之 終端機於網際網路1 0 4中瀏覽網路書店或相關網站,進行 搜尋並且決定購買某一本電子書籍,而將購買訂單傳送至 伺服器主機1〇2,伺服器主機102在進行必要的確認及查證 後,會於電子文件資料庫2 7 6中調出使用者想購買的電子 ,籍的明文,于且於密碼資料^庫274中調出使用者專屬之 =二加密鑰匙=,之後以此第二加密錄匙3 2 8對電子書籍 =應再將密文經由網際網路After using 耆 and its terminal 10 to complete registration on the server host 102, you can purchase specific e-books online at any time according to his personal wishes, and download them to the terminal 1 06 This / part is the so-called document requesting procedure in the method of the present invention. The user: browses an online bookstore or related website from the registered terminal on the Internet 104, searches for and decides to purchase an e-book, and sends the purchase order to the server host 102, the server After the host computer 102 performs the necessary confirmation and verification, it will call the electronic document database 2 7 6 for the user's desired purchase, the plain text, and call the user-specific information in the password data library 274. = Two encryption keys =, then use this second encryption recording key 3 2 8 pairs of electronic books = The cipher text should be passed through the Internet again
486902 五、發明說明 μ的::t機之閱讀應用程式3 2 2接收到所購買電子書 精f 日守’曰先以閱讀應用程式3 2 2中附屬的第一加密 鑰匙3 2 4對終端機加宓# q 9⑽〜甘士 斤 在檔3 2 6解密,以取得其中之第二加密 鑰匙3 2 8與電知辨識螞3 3 〇,然後閱讀應用程式3 2 2會對解 密所取得之電細辨識碼3 3 〇與目前終端機1 〇 6之電腦辨識碼 3 1 8進行比對。當比對結果相同時,代表目前終端機1 6 經過合法註冊之終端機,閱讀應用程式3 2 2會繼續以解穷… 所取得之第二加密鑰匙3 2 8對接收到的密文解密,使 = 就可以在閱讀應用程式3 2 2所提供的介面下閱讀解资、尚/ 的電子書籍。 、在過後 閱讀應用程式3 2 2對解密所取得之電腦辨=、 端機1 0 6之電腦辨識碼3 1 8進行比對後發$識焉3 3 0與 時,代表目前終端機1 0 6並未經過合法\^^&對結果 ^ Ί ° i 閱讀 當 目前終 不相同 應用程 二加密 閱讀電 法使用 應用程 的終端 他電腦 散佈」 式32 2連同其購買的電子書籍以及於註册’士 ^力口密檔3 2 6〆併拷貝至另一台電腦上,~所產生 ^的第三人閱讀’也就是所謂的「合、去乂便給其 上 蹲買卻非法 式3 2 2即停止後續動作,也不會如正常卜冊’閱讀 ^匙3 2 8對收刻的密文解密,因此使用^形般以第 子:f籍。這種情形會發生的最可能原因,也3就無法 者於合法註冊的終端機下載電子書籍後,^ 一個合 ^ S 2 2連同其購買的電子書籍以及於兮加’部將閱讀486902 V. Description of the invention μ :: The reading application 3 of the machine t 2 2 received the purchased e-book essence f Rishou 'said that the first encryption key 3 2 4 attached to the reading application 3 2 2机 加 宓 # q 9⑽ ~ Gan Shijin decrypts in the file 3 2 6 to obtain the second encryption key 3 2 8 and Dianzhi Ma 3 3 〇, then read the application 3 2 2 to decrypt the obtained The electrical identification code 3 3 0 is compared with the current computer identification code 3 1 8 of the terminal 1 106. When the comparison result is the same, it means that the current terminal 16 is a legally registered terminal, and the reading application 3 2 2 will continue to de-poor ... The second encryption key 3 2 8 obtained decrypts the received ciphertext, Use = to read the e-books of XieZhang and Shang / under the interface provided by the reading application 3 2 2. Afterwards, read the application 3 2 2 to identify the computer obtained from the decryption =, compare the computer identification code 3 1 8 of the terminal 1 0 6 and send $ I 焉 3 3 0 and the time, which represents the current terminal 1 0 6 has not passed the legal \ ^^ & result ^ Ί ° i reading is currently different applications 2 encrypted reading electronically using the terminal of the application to distribute it on a computer ”Formula 32 2 together with the e-books it purchased and the registration 'Shi ^ Likou secret file 3 2 6〆 and copy it to another computer, ~ produced by a third person to read', which is the so-called "combined, go to buy it and squat to buy it but illegal 3 2 2 is to stop the follow-up actions, and it will not decrypt the received ciphertext as in the normal book 'Read ^ spoon 3 2 8', so use the ^ form as the first: f. The most likely cause of this situation, 3 ca n’t download e-books on a legally registered terminal, ^ a combination ^ S 2 2 together with the e-books they purchased and Yu Xijia ’s Department will read
第15頁 486902 五、發明說明(’12) 然而,由於本發明之閱讀應用程式3 2 2對電子書籍解 密前,會先對終端機加密檔3 2 6中所取得的電腦辨識碼3 3 0 與目前解密工作所在電腦之電腦辨識碼3 1 8進行比對,而 取得一個比對的結果。如果目前解密工作所在電腦與註冊 當時之終端機是同一電腦,此一比對結果自然會相同,即 表示代表目前解密工作所在電腦為經過合法註冊之終端 機,電子書籍並未被非法散佈至其他未經合法註冊的電腦 中,於是閱讀應用程式3 2 2會繼續以解密讓使用者可以閱 讀解密過後的電子書籍。如果目前解密工作所在電腦與註 冊當時之終端機不相同時,此一比對結果自然不相同,即 表示代表目前解密工作所在電腦並未經過合法註冊,也就 是說,電子書籍已經被非法散佈至其他未經合法註冊的電 腦中,於是閱讀應用程式3 2 2會停止解密的步驟,使用者 即使取得非法散佈的電子書籍也無法進行解密閱讀。 請參閱圖五,圖五A為本發明防盜拷電腦系統在文件 索取程序時於伺服器主機端之流程圖,圖五B為本發明防 盜拷電腦系統在文件索取程序時於終端機之流程圖。將上 述文件索取程序以流程圖5 0 0表示如下列步驟: 步驟5 0 2 :開始; 步驟504:使用者於網路書店中決定購買某一本電子 書籍; 步驟5 0 6 ··伺服器主機1 0 2處理購買訂單並進行必要的 確認及查證;Page 15 486902 V. Description of the invention ('12) However, before the reading application 3 2 2 of the present invention decrypts an electronic book, the terminal will first encrypt the computer identification code 3 2 6 obtained in the file 3 2 6 Compare with the computer identification code 3 1 8 of the computer where the decryption work is currently performed, and obtain a comparison result. If the computer where the decryption job is currently located is the same computer as the terminal at the time of registration, this comparison will naturally be the same, which means that the computer where the decryption job is currently located is a legally registered terminal, and the electronic books have not been illegally distributed to other On a computer that has not been legally registered, the reading application 3 2 2 will continue to decrypt to allow the user to read the decrypted e-book. If the computer where the decryption job is currently located is different from the terminal at the time of registration, the result of this comparison is naturally different, which means that the computer where the decryption job is currently located has not been legally registered, that is, the electronic books have been illegally distributed to On other computers that have not been legally registered, the reading application 3 2 2 will stop the decryption step, and users will not be able to decrypt and read even if they obtain illegally distributed electronic books. Please refer to FIG. 5. FIG. 5A is a flowchart of the anti-theft computer system of the present invention on the server host during a document requesting process, and FIG. 5B is a flowchart of the anti-theft computer system of the present invention on a terminal during a document requesting process . The above-mentioned document requesting procedure is represented by the flowchart 5 0 0 as follows: Step 5 0 2: Start; Step 504: The user decides to purchase an e-book in the online bookstore; Step 5 6 ·· Server host 1 0 2 Process the purchase order and perform necessary confirmation and verification;
第16頁 486902 五、發明說明(’13) 步驟5 0 8 :訂單是否通過查證?是,到步驟5 1 2 “否, 到步驟5 1 0 ; 步驟5 1 0 :拒絕接受此次訂單並立即停止交易;到步 驟 5 4 0 ; 步驟5 1 2 :於電子文件資料庫2 7 6中調出購買的電子書 籍的明文; 步驟5 1 4 :於密碼資料庫2 7 4中調出使用者專屬之第二 加密鑰匙3 2 8 ; 步驟5 1 6 :以此第二加密鑰匙3 2 8對電子書籍的明文加 密以形成相對應之密文; 步驟5 1 8 :將密文經由網際網路1 0 4傳送至終端機 106; 步驟5 2 0 :終端機1 0 6之閱讀應用程式3 2 2以第一加密 鑰匙3 2 4對終端機加密檔3 2 6解密; 步驟5 2 2 :解密後取得第二加密鑰匙3 2 8與電腦辨識碼 3 3 0 ; 步驟5 2 4 :取得目前工作所在電腦之電腦辨識碼3 1 8 ; 步驟5 2 6 :閱讀應用程式3 2 2對解密所取得之電腦辨識 碼3 3 0與目前電腦之電腦辨識碼3 1 8進行比對; 步驟5 2 8 :比對結果是否相同?是,到步驟5 3 0 ;否, 到步驟5 3 6 ;Page 16 486902 V. Description of the invention (’13) Step 5 0 8: Has the order been verified? Yes, go to step 5 1 2 "No, go to step 5 1 0; step 5 1 0: refuse to accept the order and stop trading immediately; go to step 5 4 0; step 5 1 2: in the electronic file database 2 7 6 Call the plaintext of the purchased e-book; Step 5 1 4: Call the user-specific second encryption key 3 2 8 from the password database 2 7 4; Step 5 1 6: Use this second encryption key 3 2 8 Encrypt the plain text of the electronic book to form the corresponding cipher text; Step 5 1 8: Send the cipher text to the terminal 106 via the Internet 104; Step 5 2 0: The reading application of the terminal 106 3 2 2 Use the first encryption key 3 2 4 to decrypt the terminal encrypted file 3 2 6; Step 5 2 2: Obtain the second encryption key 3 2 8 and computer identification code 3 3 0 after decryption; Step 5 2 4: Get The computer identification code 3 1 8 of the computer on which the current work is located; Step 5 2 6: Read the application program 3 2 2 to compare the computer identification code 3 3 0 obtained from the decryption with the computer identification code 3 1 8 of the current computer; step 5 2 8: Are the comparison results the same? Yes, go to step 5 3 0; No, go to step 5 3 6;
步驟5 3 0 :目前終端機1 0 6已確認經過合法註冊; 步驟5 3 2 ··閱讀應用程式3 2 2以第二加密鑰匙3 2 8對接 收到的電子書籍密文解密;Step 5 3 0: The current terminal 10 has been confirmed to be legally registered. Step 5 3 2 ·· Read the application 3 2 2 with the second encryption key 3 2 8 to decrypt the received electronic book ciphertext;
第17頁 486902 五、發明說明(14) 步驟5 3 4 :使用者可以閱讀解密過後的電子書籍;到 步驟5 4 0 ; 步驟5 3 6 :目前終端機未經過合法註冊; 步驟5 3 8 :閱讀應用程式3 2 2停止解密動作; 步驟5 4 0 :結束。 本發明上述之較佳實施例是以私鑰密碼系統為例加以 說明,也就是說對電子書籍加密解密用的是同一把加密鑰 匙,除了資料傳輸之雙方外,其他第三人並不知道加密鑰 匙的内容為何,因此也稱為對稱型的密碼系統,如美國國 家標準局所公佈的DES演算法,或是Lai及Massey所設計的 I D E A演算法,其安全性較強,加解密時運算速度也較快。 然而,本發明之電腦系統1 0 0同樣也可採用公開金鑰密碼 系統來對電子書籍加密與解密,也就是說每一個使用者會 擁有一把可以公佈出來的公開金錄,與一把自己保留不能 洩漏的私有金鑰,當伺服器主機1 0 2之加密模組2 5 0對電子 書籍加密時,用的是使用者的公開金鑰,而當閱讀應用程 式3 2 2對接收到的電子書籍密文進行解密時,用的是使用 者的私有金输。 與習知技術相比較,本發明防盜拷電腦系統10 0之優 點在於: 一、不同使用者或終端機所需要的閱讀操作平台都是 相同的。由於所有使用者都是經由閱讀應用程式3 2 2與伺Page 17 486902 V. Description of the invention (14) Step 5 3 4: The user can read the decrypted electronic book; go to step 5 40; step 5 36: the terminal is not legally registered at present; step 5 3 8: Read the application 3 2 2 to stop the decryption action; Step 5 4 0: End. The above-mentioned preferred embodiment of the present invention is described by using a private key cryptosystem as an example. That is to say, the same encryption key is used to encrypt and decrypt electronic books. Except for both parties of data transmission, other third parties do not know the encryption. What is the content of the key, so it is also called a symmetric cryptosystem, such as the DES algorithm announced by the US National Bureau of Standards, or the IDEA algorithm designed by Lai and Massey. It has strong security, and the speed of encryption and decryption operations Faster. However, the computer system 100 of the present invention can also use the public key cryptosystem to encrypt and decrypt electronic books, that is, each user will have a public gold record that can be published, and one Keep the private key that cannot be leaked. When the encryption module 2 50 of the server host 102 encrypts the electronic book, the public key of the user is used, and when the reading application 3 2 2 receives the received When decrypting the e-book ciphertext, the user's private gold is used. Compared with the conventional technology, the advantages of the anti-theft computer system 100 of the present invention are as follows: 1. The reading operation platforms required by different users or terminals are the same. Since all users read the application 3 2 2 and wait
第18頁 486902 五、發明說明(15) 服器主機1 0 2進行註冊及文件索取的程序,閱讀應用程式 ' 3 2 2則成為一閱讀操作平台,以提供使用者與伺服器主機 . 1 0 2溝通的橋樑,閱讀應用程式3 2 2及其中之第一加密鑰匙 3 2 4都是事先經過編譯完成而可供使用者免費下載或拷貝 至任何機器上。由於本發明電腦系統的目的之一在於防止 電子書籍推廣時所可能造成的阻卻事由,也就是防止電子 書籍的非法散佈,而不在於防止閱讀應用程式3 2 2本身的 散佈,同時由於本發明防止電子書籍非法散佈的機制主要 並不在於閱讀應用程式3 2 2本身,因此,閱讀應用程式3 2 2 經由使用者大量的下載、拷貝或散佈不但不會影響本發明 之目的,反而有助於推銷電子書籍的概念給使用者,使電 子書籍的使用能加速普及。 · 二、使用者在為其所指定的終端機註冊時,伺服器主 機1 0 2之加密鑰匙產生模組2 4 0會產生一專屬於使用者的第 二加密鑰匙。當使用者購買某一本電子書籍時,加密模組 2 5 0會以此第二加密鑰匙3 2 8對電子書籍的明文加密以形成 相對應之密文,傳送至使用者所在之終端機上,而終端機 上之閱讀應用程式3 2 2在確認目前終端機經過合法註冊 後,始再以第二加密鑰匙3 2 8對接收到的電子書籍密文解 密。由於某些先前技術對不同使用者購買的電子書籍都以 相同的加密錄匙作加解密,一旦此一加密输匙被破解,則 0 :所有電子書籍的密文都可以正確被還原成明文;然而本發 :. 明針對每一使用者都有專屬的第二加密鑰匙,因此即使某Page 18 486902 V. Description of the invention (15) The server host 1 0 2 performs registration and document requesting procedures, and the reading application program '3 2 2 becomes a reading operation platform to provide users and server hosts. 1 0 2 The bridge of communication, the reading application 3 2 2 and the first encryption key 3 2 4 are compiled in advance and can be downloaded or copied to any machine for free by users. As one of the objectives of the computer system of the present invention is to prevent possible hindrances during the promotion of electronic books, that is, to prevent the illegal distribution of electronic books, and not to prevent the distribution of reading application programs 3 2 2 itself, and because of the invention The mechanism for preventing the illegal distribution of electronic books is not mainly in the reading application 3 2 2 itself. Therefore, the reading application 3 2 2 is downloaded, copied or distributed by users in large quantities, which will not affect the purpose of the present invention, but will help Promote the concept of electronic books to users, so that the use of electronic books can accelerate their popularity. · 2. When the user registers for the terminal specified by him, the encryption key generation module 24 of the server host 102 will generate a second encryption key that is unique to the user. When a user purchases an e-book, the encryption module 2 50 will encrypt the plain text of the e-book with the second encryption key 3 2 8 to form the corresponding cipher text, and send it to the terminal where the user is After confirming that the terminal is legally registered, the reading application 3 2 2 on the terminal decrypts the received electronic book ciphertext with the second encryption key 3 2 8. Because some previous technologies use the same encryption key to encrypt and decrypt electronic books purchased by different users, once this encryption key is cracked, 0: the ciphertext of all electronic books can be correctly restored to plaintext; However, this issue:. Ming has a dedicated second encryption key for each user, so even if a
第19頁 486902 五、發明說明C16) 一使用者的第二加密鑰匙被破解,仍然無法閱讀其他使用 者所購買之電子書籍,因此可提高系統的安全性。 三、 終端機加密檔以加密之形式儲存於終端機中,可 避免使用者不小心更改其中的内容,也可以減低其他人以 非法的方式查看並得知其中的内容。 四、 終端機加密檔儲存於終端機,有助於簡化因電腦 辨識碼上傳所帶來的隱私權公開時需使用者同意之複雜程 序。由於本發明於認證終端機是否經合法註冊所需要的電 腦辨識碼,是借用其中t央處理器之辨識碼、硬碟機之辨 識碼或是網路卡之辨識碼等為之,而這些辨識碼的資料依 法是視為使用者個人隱私資料之一部份,伺服器主機1 〇 2 對於使用者所提出任何這類辨識碼之取得都要經過使用者 的同意,因此,只要伺服器主機1 0 2想取得終端機的電腦 辨識碼都無法規避使用者同意的程序,於是在認證終端機 是否經合法註冊的程序上原本應該會變得較為複雜。然 而,依據本發明之設計,當使用者在為其所指定的終端機 註冊時,下傳之使用者辨識碼與第二加密鑰匙在解密後, 會連同代表該終端機之電腦辨識碼會以第一加密鑰匙加密 而產生相對應的終端機加密檔,因此在註冊程序進行過程 中,並不需將電腦辨識碼上傳給伺服器主機1 0 2。因此當 終端機接收到使用者所購買電子書籍之密文時,其所執行 i之後續認證程序所需之電腦辨識碼是註冊時就直接儲存於Page 19 486902 V. Description of the invention C16) The second encryption key of a user is cracked, and the electronic books purchased by other users cannot be read, so the security of the system can be improved. 3. The encrypted file of the terminal is stored in the terminal in an encrypted form, which can prevent users from accidentally changing its content, and it can also reduce others from viewing and knowing its contents in an illegal way. 4. The encrypted file of the terminal is stored in the terminal, which helps to simplify the complicated procedures that require the user's consent when the privacy rights brought about by the upload of the computer identification code are disclosed. Since the computer identification code required by the present invention for authenticating the terminal is legally registered, the identification code of the central processing unit, the identification code of the hard disk drive, or the identification code of the network card is borrowed, and these identifications The data of the code is considered as part of the user's personal privacy data. The server host 1 02 must obtain the user ’s consent to obtain any such identification code proposed by the user. Therefore, as long as the server host 1 0 2 There are no procedures for obtaining the computer identification code of the terminal to avoid the user's consent. Therefore, the procedure for authenticating whether the terminal is legally registered should have become more complicated. However, according to the design of the present invention, when a user registers for a terminal designated by him, the user identification code and the second encryption key transmitted after decryption will be decrypted together with the computer identification code representing the terminal. The first encryption key is encrypted to generate a corresponding terminal encrypted file. Therefore, it is not necessary to upload the computer identification code to the server host 102 during the registration process. Therefore, when the terminal receives the cipher text of the electronic book purchased by the user, the computer identification code required for the subsequent authentication process performed by i is directly stored in the registration.
486902 五、發明說明(17) 終端機中,因此目前工作終端機之電腦辨識碼自然也不必 上傳至伺服器主機1 〇 2,而可以直接在終端機中進行比較 及認證的工作,自然簡化了因電腦辨識碼上傳所會帶來的 隱私權公開需要使用者同意之複雜程序及可能的爭議。 五、利用終端機加密檔3 2 6中所取得的電腦辨識碼3 3 0 與目前解密工作所在電腦之電腦辨識碼31 8進行比對,可 防止「合法購買卻非法散佈」之情事。由於本發明之閱讀 應用程式3 2 2對電子書籍解密前,會先對終端機加密檔3 2 6 中所取得的電腦辨識碼3 3 0與目前解密工作所在電腦之電 腦辨識碼3 1 8進行比對,以確認目前解密工作所在電腦與 註冊當時之終端機是同一電腦,其次再決定並閱讀應用程 式3 2 2是否會繼續進行電子書籍密文的解密工作。因此, 即使電子書籍的密文被非法散佈至其他未經合法註冊的電 腦中,閱讀應用程式3 2 2會停止解密的步驟,使非法散佈 的電子書籍無法正確解密而無法進行閱讀。 綜上所述,本發明電腦系統提出了一種有效的機制, 來防止非經合法註冊之終端機對電子文件之盜拷,因而遏 阻「合法購買卻非法散佈」的情形,使得電子書籍的經銷 商因可維持合理的利潤而願意投入於書籍電子化買賣的行 列當中,因此使得電子書籍之環保性、效率性、傳播性、 經濟性等多重優點可為全民所共享。486902 V. Description of the invention (17) In the terminal, the computer identification code of the current working terminal naturally does not have to be uploaded to the server host 102, but can be directly compared and authenticated in the terminal, which naturally simplifies the work. The disclosure of privacy rights due to the upload of computer identification codes requires complicated procedures and possible disputes that require user consent. V. Using the computer identification code 3 3 0 obtained in the encrypted file 3 2 6 of the terminal to compare with the computer identification code 3 1 8 of the computer where the decryption work is currently performed can prevent the situation of "legal purchase but illegal distribution". Because the reading application 3 2 2 of the present invention decrypts the electronic book, the computer identification code 3 3 0 obtained from the encrypted file 3 2 6 of the terminal is first performed with the computer identification code 3 1 8 of the computer where the decryption work is currently performed. Compare to confirm that the computer where the decryption is currently performed is the same computer as the terminal at the time of registration, and then determine and read whether the application 3 2 2 will continue to decrypt the ciphertext of the electronic book. Therefore, even if the cipher text of the electronic book is illegally distributed to other computers that are not legally registered, the reading application 3 2 2 will stop the decryption step, so that the illegally distributed electronic book cannot be correctly decrypted and cannot be read. In summary, the computer system of the present invention proposes an effective mechanism to prevent unauthorized copying of electronic files by terminals that have not been legally registered, thus curbing the situation of "legitimate purchase but illegal distribution", and the distribution of electronic books Businesses are willing to invest in the electronic book trading because they can maintain reasonable profits, so the multiple advantages of environmental protection, efficiency, dissemination, and economics of electronic books can be shared by the entire people.
486902 五、發明說明(18) 以上所述僅為本發明之較佳實施例,凡依本發明申請 專利範圍所做之均等變化與修飾,皆應屬本發明專利之涵 蓋範圍。486902 V. Description of the invention (18) The above description is only a preferred embodiment of the present invention. Any equivalent changes and modifications made in accordance with the scope of the patent application for the present invention shall fall within the scope of the invention patent.
第22頁 486902 圖式簡單說明^ 圖式之簡單說明 。 圖一為本發明可防止電子文件盜拷之電腦系統之示意 圖。 圖二為本發明防盜拷電腦系統之伺服器主機的功能方 塊圖。 圖三為本發明防盜拷電腦系統之終端機的功能方塊圖 圖四為本發明防盜拷電腦系統於註冊程序時之流程 圖。 圖五A為本發明防盜拷電腦系統在文件索取程序時於 伺服器主機端之流程圖。 圖五B為本發明防盜拷電腦系統在文件索取程序時於 用戶終端機之流程圖。 圖示之符號說明 100 防 盜 拷 電 腦 系 統 102 伺 服 器 主 機 103 防 火 牆 裝 置 104 網 際 網 路 1 06 > 108, • 1 10 終 端機 210 介 面 模 組 220 公 用 程 式 模 組 230 註 冊 模 組 240 加 密 输 匙 產 生 模 組 250 加 密 模 組 260 交 易 處 理 及 查 證 模組 270 資 料 庫 272 用 戶 資 料 庫 274 密 石馬 資 料 庫 276 電 子 文 件 資 料 庫Page 22 486902 Simple illustration of the drawing ^ Simple illustration of the drawing. FIG. 1 is a schematic diagram of a computer system capable of preventing electronic files from being stolen. Figure 2 is a functional block diagram of the server host of the anti-theft computer system of the present invention. Figure 3 is a functional block diagram of the terminal of the anti-theft computer system of the present invention. Figure 4 is a flowchart of the anti-theft computer system of the present invention during the registration process. FIG. 5A is a flowchart of the anti-theft computer system of the present invention on the host side of the server during a document retrieval process. Fig. 5B is a flow chart of the anti-theft computer system of the present invention on a user terminal when a file requesting procedure is performed. Explanation of Symbols 100 Anti-theft computer system 102 Server host 103 Firewall device 104 Internet 1 06 > 108, • 1 10 Terminal 210 Interface module 220 Utility module 230 Registration module 240 Encryption key generation Module 250 Cryptographic Module 260 Transaction Processing and Verification Module 270 Database 272 User Database 274 Dense Horse Database 276 Electronic Document Database
第23頁 486902 圖式簡單說明 280 控 制 中心 302 中 央 處 理 器 304 硬 碟 機 306 網 路 卡 308 鍵 盤 310 滑 鼠 312 榣 桿 314 螢 幕 316 印 表 機 318 目 前 工作終端 機之電腦辨 識碼 320 1己 憶 體 322 閱 讀 應 用 程 式 324 第 一 加密錄匙 326 終 端 機 加 密 檔 327 使 用 者識別碼 328 第 二 加 密 錄 匙 330 電 腦 辨識碼Page 23 486902 Brief description of the diagram 280 Control center 302 Central processing unit 304 Hard disk drive 306 Network card 308 Keyboard 310 Mouse 312 Pole 314 Screen 316 Printer 318 Computer identification code of the current working terminal 320 1 Body 322 Read application 324 First encrypted recording key 326 Terminal encrypted file 327 User identification code 328 Second encrypted recording key 330 Computer identification code
第24頁Page 24
Claims (1)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW089116219A TW486902B (en) | 2000-08-11 | 2000-08-11 | Method capable of preventing electronic documents from being illegally copied and its system |
| US09/682,256 US20020034304A1 (en) | 2000-08-11 | 2001-08-10 | Method of preventing illegal copying of an electronic document |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW089116219A TW486902B (en) | 2000-08-11 | 2000-08-11 | Method capable of preventing electronic documents from being illegally copied and its system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TW486902B true TW486902B (en) | 2002-05-11 |
Family
ID=21660741
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW089116219A TW486902B (en) | 2000-08-11 | 2000-08-11 | Method capable of preventing electronic documents from being illegally copied and its system |
Country Status (2)
| Country | Link |
|---|---|
| US (1) | US20020034304A1 (en) |
| TW (1) | TW486902B (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7764787B2 (en) | 2003-06-19 | 2010-07-27 | International Business Machines Corporation | System and method for authenticating software using protected master key |
| TWI424329B (en) * | 2010-05-26 | 2014-01-21 | Prime View Int Co Ltd | Electronic reading apparatus and the data protection method thereof |
| TWI463340B (en) * | 2012-04-09 | 2014-12-01 | Excellence Inc E | Digital file communication method and system |
Families Citing this family (26)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2004140757A (en) * | 2002-10-21 | 2004-05-13 | Toshiba Corp | Content encryption method, decryption method for decrypting encrypted data, and apparatus therefor |
| US20050270572A1 (en) * | 2003-04-03 | 2005-12-08 | Web Bindery Llc | System and method for virtual print devices for command implementation |
| US20060041839A1 (en) * | 2003-04-03 | 2006-02-23 | Peter Kassan | System and method for providing formatted print pages |
| US20060005030A1 (en) * | 2003-04-03 | 2006-01-05 | Web Bindery Llc | System and method for managing copyright information of electronic content |
| US7469343B2 (en) * | 2003-05-02 | 2008-12-23 | Microsoft Corporation | Dynamic substitution of USB data for on-the-fly encryption/decryption |
| US7912214B2 (en) * | 2007-07-20 | 2011-03-22 | Amadeus S.A.S. | Method and system for generating and controlling the distribution and use of personal promotion codes by targeted customers |
| US9349127B2 (en) * | 2007-11-29 | 2016-05-24 | Visa Usa Inc. | Serial number and payment data based payment card processing |
| US8396799B2 (en) | 2007-11-29 | 2013-03-12 | Visa U.S.A. Inc. | Media device payments remote control personalization and protection |
| AU2010202038B2 (en) * | 2008-05-29 | 2016-01-14 | Visa U.S.A. Inc. | Serial number and payment data based payment card processing |
| WO2016072022A1 (en) * | 2014-11-07 | 2016-05-12 | 株式会社日立製作所 | Method for retrieving encrypted graph, system for retrieving encrypted graph, and computer |
| US10461939B2 (en) * | 2017-02-08 | 2019-10-29 | Ca, Inc. | Secure device registration for multi-factor authentication |
| CN109510702B (en) * | 2018-10-27 | 2023-05-16 | 福建福诺移动通信技术有限公司 | Key storage and use method based on computer feature codes |
| US20210005206A1 (en) | 2019-07-05 | 2021-01-07 | Talkdesk, Inc. | System and method for speech-enabled automated agent assistance within a cloud-based contact center |
| US11328205B2 (en) | 2019-08-23 | 2022-05-10 | Talkdesk, Inc. | Generating featureless service provider matches |
| US20210117882A1 (en) | 2019-10-16 | 2021-04-22 | Talkdesk, Inc | Systems and methods for workforce management system deployment |
| US12271848B2 (en) | 2019-10-29 | 2025-04-08 | Talkdesk, Inc. | Systems and methods for recommending rules for routing calls |
| US20210136220A1 (en) | 2019-10-31 | 2021-05-06 | Talkdesk, Inc. | Monitoring and listening tools across omni-channel inputs in a graphically interactive voice response system |
| US11736615B2 (en) | 2020-01-16 | 2023-08-22 | Talkdesk, Inc. | Method, apparatus, and computer-readable medium for managing concurrent communications in a networked call center |
| US20220366070A1 (en) * | 2021-05-14 | 2022-11-17 | Oliver Fritz Glas | Securing Sensitive Data Executed By Program Scripts In A Computing Device |
| US11677875B2 (en) | 2021-07-02 | 2023-06-13 | Talkdesk Inc. | Method and apparatus for automated quality management of communication records |
| US11856140B2 (en) | 2022-03-07 | 2023-12-26 | Talkdesk, Inc. | Predictive communications system |
| US11736616B1 (en) | 2022-05-27 | 2023-08-22 | Talkdesk, Inc. | Method and apparatus for automatically taking action based on the content of call center communications |
| US11971908B2 (en) | 2022-06-17 | 2024-04-30 | Talkdesk, Inc. | Method and apparatus for detecting anomalies in communication data |
| US11943391B1 (en) | 2022-12-13 | 2024-03-26 | Talkdesk, Inc. | Method and apparatus for routing communications within a contact center |
| US12381983B2 (en) | 2023-03-06 | 2025-08-05 | Talkdesk, Inc. | System and method for managing communications in a networked call center |
| US12395588B2 (en) | 2023-08-28 | 2025-08-19 | Talkdesk, Inc. | Method and apparatus for creating a database of contact center response records |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6351536B1 (en) * | 1997-10-01 | 2002-02-26 | Minoru Sasaki | Encryption network system and method |
-
2000
- 2000-08-11 TW TW089116219A patent/TW486902B/en not_active IP Right Cessation
-
2001
- 2001-08-10 US US09/682,256 patent/US20020034304A1/en not_active Abandoned
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7764787B2 (en) | 2003-06-19 | 2010-07-27 | International Business Machines Corporation | System and method for authenticating software using protected master key |
| US7770021B2 (en) | 2003-06-19 | 2010-08-03 | International Business Machines Corporation | Authenticating software using protected master key |
| TWI424329B (en) * | 2010-05-26 | 2014-01-21 | Prime View Int Co Ltd | Electronic reading apparatus and the data protection method thereof |
| TWI463340B (en) * | 2012-04-09 | 2014-12-01 | Excellence Inc E | Digital file communication method and system |
Also Published As
| Publication number | Publication date |
|---|---|
| US20020034304A1 (en) | 2002-03-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| TW486902B (en) | Method capable of preventing electronic documents from being illegally copied and its system | |
| US20230108366A1 (en) | Systems for encryption using blockchain distributed ledgers | |
| US8533860B1 (en) | Personalized digital media access system—PDMAS part II | |
| RU2352985C2 (en) | Method and device for authorisation of operations with content | |
| JP4274421B2 (en) | Pseudo-anonymous user and group authentication method and system on a network | |
| EP2267628B1 (en) | Token passing technique for media playback devices | |
| US7337332B2 (en) | Transferring electronic content | |
| US8402555B2 (en) | Personalized digital media access system (PDMAS) | |
| CN100576148C (en) | Systems and methods for providing secure server key operations | |
| US8539233B2 (en) | Binding content licenses to portable storage devices | |
| US20100185868A1 (en) | Personilized digital media access system | |
| US20030161335A1 (en) | Method and system to dynamically present a payment gateway for content distributed via a network | |
| US20090268912A1 (en) | Data use managing system | |
| JP2009526321A (en) | System for executing a transaction in a point-of-sale information management terminal using a changing identifier | |
| JP2003058657A (en) | License management server and license management method | |
| JP2005536951A (en) | Apparatus, system, and method for securing digital documents in a digital device | |
| JP2003531447A5 (en) | ||
| AU2001269856A1 (en) | Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (drm) | |
| WO2001098903A1 (en) | Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (drm) | |
| JP2002527009A (en) | Method and system for distributing access to data items | |
| KR101702748B1 (en) | Method, system and recording medium for user authentication using double encryption | |
| US12141247B1 (en) | Apparatus and method for persistent digital rights management | |
| CN1141678C (en) | Method and system for preventing electronic file piracy | |
| JP2004341832A (en) | Personal information management method and system, disclosure identifier issuing device, personal information disclosure device | |
| JP2003264540A (en) | Information distribution method and system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| GD4A | Issue of patent certificate for granted invention patent | ||
| MM4A | Annulment or lapse of patent due to non-payment of fees |